InterGate Intercept sits at the edge of your network monitoring all
incoming and outgoing traffic. It recognizes Instant Messaging and
Peer-to-Peer traffic using application signatures. This means that it
examines individual network traffic packets to see what application
has generated them. If the packet has been generated by a forbidden
application, the packet will be refused. InterGate Intercept also
uses heuristics. This means that it analyses traffic, looking for
behavior patterns typical of forbidden applications that do not
identify themselves with a signature as any legitimate application
should.
In bridging mode, all network traffic must pass through Vicomsoft
Policy Manager, as there is no physical access to the Internet
otherwist. This means that you have total control over Instant
Messaging and Peer-to-Peer traffic flowing over your network.